Print this page
7029 want per-process exploit mitigation features (secflags)
7030 want basic address space layout randomization (aslr)
7031 noexec_user_stack should be a secflag
7032 want a means to forbid mappings around NULL.

@@ -20,11 +20,11 @@
 # fields enclosed by brackets "[]" replaced with your own identifying
 # information: Portions Copyright [yyyy] [name of copyright owner]
 #
 # CDDL HEADER END
 #
-#ident  "%Z%%M% %I%     %E% SMI"
+
 #
 # This file generates three different C files:
 #
 #       <sys/priv_const.h>
 #               An implementation private set of manifest integer constant

@@ -105,11 +105,11 @@
         if (NF == 3) {
                 key = toupper($1)
                 priv = toupper($3)
                 if (set[key] != "")
                         set[key] = set[key] ";"
-                set[key] = set[key] "\\\n\t\tPRIV_ASSERT((set), " priv ")"
+                set[key] = set[key] "\\\n\t\tPRIV_ADDSET((set), " priv ")"
         } else {
                 priv = toupper($2);
         }
         privs[npriv] = tolower(substr(priv, 6));
         inset = 0

@@ -355,11 +355,11 @@
                 print "\n#define\tMAX_PRIVILEGE\t\t\t "  setsize * 32 \
                         > privhfile
 
                 # Special privilege categories.
                 for (s in set)
-                        print "\n#define\tPRIV_" s "_ASSERT(set)" set[s] \
+                        print "\n#define\tPRIV_" s "_ADDSET(set)" set[s] \
                                 > privhfile
 
                 print "\n#endif /* _KERNEL */" > privhfile
                 print "\n#ifdef __cplusplus\n}\n#endif" > privhfile
                 print "\n#endif /* _SYS_PRIV_CONST_H */" > privhfile